# Craig B. Gentry
gen_feedback_link(leftr, rightr);

## contact information

Distinguished RSM

Thomas J. Watson Research Center, Yorktown Heights, NY USA

gen_contact_link(leftr, rightr); +19149452289

Thomas J. Watson Research Center, Yorktown Heights, NY USA

## links

**2016**

Functional Encryption Without Obfuscation

Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry

Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry

*Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II*,*pp. 480--511*
Pinocchio: nearly practical verifiable computation

Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova

Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova

*Commun. ACM**59*(*2*), 103--112, 2016**2015**

Graph-Induced Multilinear Maps from Lattices

Craig Gentry, Sergey Gorbunov, Shai Halevi

Craig Gentry, Sergey Gorbunov, Shai Halevi

*Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II*,*pp. 498--527*
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination
Assumption

Craig Gentry, Allison Bishop Lewko, Amit Sahai, Brent Waters

Craig Gentry, Allison Bishop Lewko, Amit Sahai, Brent Waters

*IEEE 56th Annual Symposium on Foundations of Computer Science, FOCS 2015, Berkeley, CA, USA, 17-20 October, 2015*,*pp. 151--170*
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations

Jean-S\'{e}bastien Coron, Craig Gentry, Shai Halevi, Tancr\`{e}de Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi

Jean-S\'{e}bastien Coron, Craig Gentry, Shai Halevi, Tancr\`{e}de Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi

*Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I*,*pp. 247--266*
Private Database Access with HE-over-ORAM Architecture

Craig Gentry, Shai Halevi, Charanjit S. Jutla, Mariana Raykova

Craig Gentry, Shai Halevi, Charanjit S. Jutla, Mariana Raykova

*Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers*,*pp. 172--191*
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative
Zero-Knowledge Proofs

Craig Gentry, Jens Groth, Yuval Ishai, Chris Peikert, Amit Sahai, Adam D. Smith

Craig Gentry, Jens Groth, Yuval Ishai, Chris Peikert, Amit Sahai, Adam D. Smith

*J. Cryptology**28*(*4*), 820--843, 2015**2014**

Computing on the edge of chaos: Structure and randomness in encrypted
computation

Craig Gentry

Craig Gentry

*Electronic Colloquium on Computational Complexity (ECCC)**21*, 106, 2014
Two-Round Secure MPC from Indistinguishability Obfuscation

Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova

Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova

*Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings*,*pp. 74--94*
Outsourcing Private RAM Computation

Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs

Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs

*55th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2014, Philadelphia, PA, USA, October 18-21, 2014*,*pp. 404--413*
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact
Garbled Circuits

Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy

Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy

*Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings*,*pp. 533--556*
Garbled RAM Revisited

Craig Gentry, Shai Halevi, Steve Lu, Rafail Ostrovsky, Mariana Raykova, Daniel Wichs

Craig Gentry, Shai Halevi, Steve Lu, Rafail Ostrovsky, Mariana Raykova, Daniel Wichs

*Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings*,*pp. 405--422*
On the Implausibility of Differing-Inputs Obfuscation and Extractable
Witness Encryption with Auxiliary Input

Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs

Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs

*Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I*,*pp. 518--535*
Witness Encryption from Instance Independent Assumptions

Craig Gentry, Allison B. Lewko, Brent Waters

Craig Gentry, Allison B. Lewko, Brent Waters

*Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I*,*pp. 426--443*
Noncommutative Determinant is Hard: A Simple Proof Using an Extension
of Barrington's Theorem

Craig Gentry

Craig Gentry

*IEEE 29th Conference on Computational Complexity, CCC 2014, Vancouver, BC, Canada, June 11-13, 2014*,*pp. 181--187***2013**

Witness encryption and its applications

Sanjam Garg, Craig Gentry, Amit Sahai, Brent Waters

Sanjam Garg, Craig Gentry, Amit Sahai, Brent Waters

*Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA, USA, June 1-4, 2013*,*pp. 467--476*
Packed Ciphertexts in LWE-Based Homomorphic Encryption

Zvika Brakerski, Craig Gentry, Shai Halevi

Zvika Brakerski, Craig Gentry, Shai Halevi

*Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings*,*pp. 1--13*
Optimizing ORAM and Using It Efficiently for Secure Computation

Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, Daniel Wichs

Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, Daniel Wichs

*Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings*,*pp. 1--18*
Candidate Indistinguishability Obfuscation and Functional Encryption
for all Circuits

Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters

Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters

*54th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2013, 26-29 October, 2013, Berkeley, CA, USA*,*pp. 40--49*
Quadratic Span Programs and Succinct NIZKs without PCPs

Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova

Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova

*Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings*,*pp. 626--645*
Candidate Multilinear Maps from Ideal Lattices

Sanjam Garg, Craig Gentry, Shai Halevi

Sanjam Garg, Craig Gentry, Shai Halevi

*Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings*,*pp. 1--17*
Attribute-Based Encryption for Circuits from Multilinear Maps

Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters

Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters

*Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II*,*pp. 479--499*
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler,
Asymptotically-Faster, Attribute-Based

Craig Gentry, Amit Sahai, Brent Waters

Craig Gentry, Amit Sahai, Brent Waters

*Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I*,*pp. 75--92*
Discrete Gaussian Leftover Hash Lemma over Infinite Domains

Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai

Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai

*Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I*,*pp. 97--116*
Private Database Queries Using Somewhat Homomorphic Encryption

Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu

Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu

*Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings*,*pp. 102--118*
Field switching in BGV-style homomorphic encryption

Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart

Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart

*Journal of Computer Security**21*(*5*), 663--684, 2013**2012**

Ring Switching in BGV-Style Homomorphic Encryption

Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart

Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart

*Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings*,*pp. 19--37*
Better Bootstrapping in Fully Homomorphic Encryption

Craig Gentry, Shai Halevi, Nigel P. Smart

Craig Gentry, Shai Halevi, Nigel P. Smart

*Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings*,*pp. 1--16*
Fully Homomorphic Encryption with Polylog Overhead

Craig Gentry, Shai Halevi, Nigel P. Smart

Craig Gentry, Shai Halevi, Nigel P. Smart

*Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings*,*pp. 465--482*
Homomorphic Evaluation of the AES Circuit

Craig Gentry, Shai Halevi, Nigel P. Smart

Craig Gentry, Shai Halevi, Nigel P. Smart

*Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings*,*pp. 850--867*
(Leveled) fully homomorphic encryption without bootstrapping

Zvika Brakerski, Craig Gentry, Vinod Vaikuntanathan

Zvika Brakerski, Craig Gentry, Vinod Vaikuntanathan

*Innovations in Theoretical Computer Science 2012, Cambridge, MA, USA, January 8-10, 2012*,*pp. 309--325*